scispace - formally typeset
Search or ask a question
Topic

Digital forensics

About: Digital forensics is a research topic. Over the lifetime, 4270 publications have been published within this topic receiving 49676 citations. The topic is also known as: digital forensic science & Digital forensics.


Papers
More filters
Proceedings Article
27 Jul 2014
TL;DR: A framework based on literature and risk analysis techniques that organisations may apply when they want to migrate to the cloud to select a CSP that can provide an organisation with a digital forensic readiness cloud solution.
Abstract: In the digital age, organisations tend to invest large sums of their finances into technology because of the demand from business to handle their data efficiently. As these organisations grow, ubiquitous systems are required to securely store their big data. Cloud computing has emerged as a solution to this demand for a reliable and cost effective alternative to organisations. However, some organisations are skeptical about cloud computing as an ideal solution because of its pronounced susceptibility of privacy, data leakage and cyber-attacks through virtual networks. Hence, it is pivotal for organisations to have a certain level of confidence in the Cloud Service Provider (CSP) that they select as their cloud vendor. Digital forensic readiness is one of the metrics that organisations can use to measure the CSPs' ability to thwart cyber-crimes. This paper proposes a framework based on literature and risk analysis techniques that organisations may apply when they want to migrate to the cloud. The proposed framework is a process tool to select a CSP that can provide an organisation with a digital forensic readiness cloud solution.

13 citations

Proceedings ArticleDOI
21 Oct 2020
TL;DR: In this article, the authors deal with sources, classification, characteristics and uses of digital information in vehicles for forensic purposes from various perspectives, such as the behavior of a vehicle and its crew before, during and after an accident or other incident or security event under investigation.
Abstract: Modern vehicles are equipped with a large number of electronic devices. These devices generate, transmit, process and store digital data. Human transformation from digital data creates digital information that can be used for many purposes. Thus, forensic experts, security experts, police officers and investigators can use this information to clarify a traffic accident, the behavior of a vehicle and its crew before, during and after an accident or other incident or security event under investigation. Invehicle data is stored in different devices, in different data formats, and is generally not internationally standardized. Similarly, some tools for analyzing this data for forensic purposes within the European Union are not standardized. These facts make it difficult to use digital data and information obtained from it for forensic purposes. The paper deals with sources, classification, characteristics and uses of digital information in vehicles for forensic purposes from various perspectives.

13 citations

Book ChapterDOI
Ausra Dilijonaite1
23 May 2017

13 citations

Journal ArticleDOI
01 Sep 2008
TL;DR: Evidence that examiners have available to them, the artifacts left behind by installation and use of the Limewire client that will tell them what the user did and their intent behind that use and a tool that will allow the investigator to extract all the evidence and expand the investigation into the child pornography networks the suspect was a member of are introduced.
Abstract: In the world of information sharing Limewire is one of the more popular means for exchanging illicit material and therefore often features in child pornography (CP) cases. In this paper we look at evidence that examiners have available to them, the artifacts left behind by installation and use of the Limewire client that will tell them what the user did and their intent behind that use. We will also look at tips and techniques for finding and extracting evidence from unallocated space, slack space and other corners of the digital evidence. Lastly we introduce a tool AScan that will allow the investigator to extract all the evidence and expand the investigation into the child pornography networks the suspect was a member of.

13 citations

Journal Article
TL;DR: In this paper, the authors describe several statistical techniques for detecting traces of digital tampering in the absence of any digital watermark or signature, and devise detection schemes to reveal these correlations.
Abstract: A digitally altered photograph, often leaving no visual clues of having been tampered with, can be indistinguishable from an authentic photograph. As a result, photographs no longer hold the unique stature as a definitive recording of events. We describe several statistical techniques for detecting traces of digital tampering in the absence of any digital watermark or signature. In particular, we quantify statistical correlations that result from specific forms of digital tampering, and devise detection schemes to reveal these correlations.

13 citations


Network Information
Related Topics (5)
Authentication
74.7K papers, 867.1K citations
84% related
Encryption
98.3K papers, 1.4M citations
81% related
Cryptography
37.3K papers, 854.5K citations
81% related
Server
79.5K papers, 1.4M citations
77% related
Mobile computing
51.3K papers, 1M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20243
2023205
2022552
2021267
2020339
2019343